Trapdoor Functions from the Computational Diffie-Hellman Assumption

被引:20
|
作者
Garg, Sanjam [1 ]
Hajiabadi, Mohammad [1 ,2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Univ Virginia, Charlottesville, VA USA
来源
关键词
Trapdoor functions; Computational Diffie-Hellman assumption; Hash encryption; CHOSEN-CIPHERTEXT SECURITY; DETERMINISTIC ENCRYPTION; CONSTRUCTIONS; LOSSY;
D O I
10.1007/978-3-319-96881-0_13
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Trapdoor functions (TDFs) are a fundamental primitive in cryptography. Yet, the current set of assumptions known to imply TDFs is surprisingly limited, when compared to public-key encryption. We present a new general approach for constructing TDFs. Specifically, we give a generic construction of TDFs from any Chameleon Encryption (Dottling and Garg [CRYPTO'17]) satisfying a novel property which we call recyclability. By showing how to adapt current Computational Diffie-Hellman (CDH) based constructions of chameleon encryption to yield recyclability, we obtain the first construction of TDFs with security proved under the CDH assumption. While TDFs from the Decisional Diffie-Hellman (DDH) assumption were previously known, the possibility of basing them on CDH had remained open for more than 30 years.
引用
收藏
页码:362 / 391
页数:30
相关论文
共 50 条
  • [1] Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique
    Huang, Hai
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 325 - 343
  • [2] Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
    Doettling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Liu, Kevin
    Malavolta, Giulio
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 585 - 606
  • [3] Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
    Joux, A
    Nguyen, K
    [J]. JOURNAL OF CRYPTOLOGY, 2003, 16 (04) : 239 - 247
  • [4] The Kernel Matrix Diffie-Hellman Assumption
    Morillo, Paz
    Rafols, Carla
    Villar, Jorge L.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 729 - 758
  • [5] The Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, T
    Koshiba, T
    Yamamura, A
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01): : 165 - 171
  • [6] Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, Taiichi
    Koshiba, Takeshi
    Yamamura, Akihiro
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (01) : 165 - 171
  • [7] Laconic Branching Programs from the Diffie-Hellman Assumption
    Craig, Sanjam
    Hajiabadi, Mohammad
    Miao, Peihan
    Murphy, Alice
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT III, PKC 2024, 2024, 14603 : 323 - 355
  • [8] Identity-based Encryption from the Diffie-Hellman Assumption
    Doettling, Nico
    Garg, Sanjam
    [J]. JOURNAL OF THE ACM, 2021, 68 (03)
  • [9] Identity-Based Encryption from the Diffie-Hellman Assumption
    Dottling, Nico
    Garg, Sanjam
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 537 - 569
  • [10] Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
    Wen, Yunhua
    Liu, Shengli
    Han, Shuai
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (11) : 2495 - 2512